<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-21T21:15:49.500177+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/4845da41-aa9e-4ff7-9d08-524098e75036/export</id>
    <title>4845da41-aa9e-4ff7-9d08-524098e75036</title>
    <updated>2026-05-21T21:15:49.852439+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4845da41-aa9e-4ff7-9d08-524098e75036", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-HX5V-J59Q-C3J8", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14865", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-2741\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)\n\ud83d\udd39 Description: The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on CAN traffic analyses). The frame must contain the opposite RTR bit as what the filter installed in the vulnerable node contains (if the filter matches RTR frames, the frame must be a data frame or vice versa).\n\ud83d\udccf Published: 2022-10-31T17:45:09.741Z\n\ud83d\udccf Modified: 2025-05-05T14:06:07.171Z\n\ud83d\udd17 References:\n1. https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hx5v-j59q-c3j8", "creation_timestamp": "2025-05-05T14:20:35.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4845da41-aa9e-4ff7-9d08-524098e75036/export"/>
    <published>2025-05-05T14:20:35+00:00</published>
  </entry>
</feed>
